Memorex LOCK - VERSION 2-24 Technické informace Strana 127

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 568
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 126
Establishing Online Security
User Reference
Connectivity Systems, Inc.—Copyright © 2006
Use Pursuant to Company Instructions
2-63
$EPIC Unsecured profile. $EPIC, which cannot be modified, is
provided by the Online Manager to use as a model. After
$DEFSEC is secured, you can grant total system access to
selected users by modeling their user profiles after $EPIC.
Profiles modeled on $EPIC can be modified to create
custom security profiles. To prevent unauthorized access to
the Online Manager, you cannot use $EPIC as a user ID.
Use caution when modeling user profiles after $EPIC and
leaving the user profiles unmodified. If the user profiles are
left unmodified, a user can obtain the profile name and use
it to obtain total system access.
SJA SJA is an example of an unsecured profile that was modeled
after $EPIC.
User ID Definition
Zobrazit stránku 126
1 2 ... 122 123 124 125 126 127 128 129 130 131 132 ... 567 568

Komentáře k této Příručce

Žádné komentáře